Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 00:26
Static task
static1
General
-
Target
d71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf.exe
-
Size
7.0MB
-
MD5
2314bc20d7df32f3bbe8999824a89b8d
-
SHA1
007ffea653cbefc42be0d53461ee787cbf0b8bba
-
SHA256
d71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf
-
SHA512
a18fb528dc78512a45db2539e94f9748278562a24a73ab5a26825f3fcd99e4f41c793cbfc963c2294142dfb59fb4d022416f4de3c25ba55b89abbbf6b1fd8c1d
-
SSDEEP
196608:K3C1dMxliUN9V98ELBLsElalB+ZsfK9WXak4:Efie9VyKBfY+qC9W
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
xworm
5.0
backto54.duckdns.org:8989
helldog24.duckdns.org:8989
7Fvn9wsSHJeXUB5q
-
install_file
USB.exe
Extracted
lumma
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
Signatures
-
Amadey family
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/5148-1427-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Lumma family
-
Processes:
79d2c60732.exe4J089A.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 79d2c60732.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4J089A.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4J089A.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4J089A.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4J089A.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 79d2c60732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 79d2c60732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4J089A.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4J089A.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 79d2c60732.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 79d2c60732.exe -
Stealc family
-
Xworm family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
Processes:
eb3ffc280d.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF eb3ffc280d.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
Processes:
1t88s7.exe3a36L.exe5dcbb72d2b.exeskotes.exeskotes.exeskotes.exe2k5210.exe4J089A.exedd3afc8fea.exe79d2c60732.exeeb3ffc280d.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1t88s7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3a36L.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5dcbb72d2b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2k5210.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4J089A.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dd3afc8fea.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 79d2c60732.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ eb3ffc280d.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 11 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exemsedge.exechrome.exechrome.exechrome.exemsedge.exemsedge.exechrome.exechrome.exechrome.exepid Process 2396 chrome.exe 3268 chrome.exe 3492 msedge.exe 5988 chrome.exe 2388 chrome.exe 1884 chrome.exe 3500 msedge.exe 1704 msedge.exe 3216 chrome.exe 5484 chrome.exe 6344 chrome.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exe1t88s7.exe3a36L.exe5dcbb72d2b.exe79d2c60732.exeeb3ffc280d.exeskotes.exedd3afc8fea.exeskotes.exe2k5210.exe4J089A.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1t88s7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3a36L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5dcbb72d2b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 79d2c60732.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1t88s7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3a36L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eb3ffc280d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5dcbb72d2b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dd3afc8fea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion eb3ffc280d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2k5210.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2k5210.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4J089A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4J089A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dd3afc8fea.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 79d2c60732.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1t88s7.exeskotes.exeVBVEd6f.exeeb3ffc280d.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 1t88s7.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation VBVEd6f.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation eb3ffc280d.exe -
Executes dropped EXE 17 IoCs
Processes:
B0s53.exeT5h09.exe1t88s7.exeskotes.exe2k5210.exe3a36L.exe4J089A.exeVBVEd6f.exe5dcbb72d2b.exedd3afc8fea.exe701ff1219c.exe79d2c60732.exeeb3ffc280d.exeskotes.exeservice123.exeskotes.exeservice123.exepid Process 864 B0s53.exe 4344 T5h09.exe 2016 1t88s7.exe 3652 skotes.exe 4424 2k5210.exe 5100 3a36L.exe 3716 4J089A.exe 2312 VBVEd6f.exe 5184 5dcbb72d2b.exe 5276 dd3afc8fea.exe 2000 701ff1219c.exe 6776 79d2c60732.exe 1144 eb3ffc280d.exe 5776 skotes.exe 4448 service123.exe 6388 skotes.exe 6424 service123.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
4J089A.exedd3afc8fea.exeskotes.exe1t88s7.exe2k5210.exe3a36L.exeeb3ffc280d.exeskotes.exeskotes.exe5dcbb72d2b.exe79d2c60732.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 4J089A.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine dd3afc8fea.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 1t88s7.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 2k5210.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 3a36L.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine eb3ffc280d.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 5dcbb72d2b.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 79d2c60732.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid Process 4448 service123.exe 6424 service123.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Processes:
4J089A.exe79d2c60732.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4J089A.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4J089A.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 79d2c60732.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
skotes.exed71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf.exeB0s53.exeT5h09.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\79d2c60732.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009457001\\79d2c60732.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" B0s53.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" T5h09.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5dcbb72d2b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009454001\\5dcbb72d2b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dd3afc8fea.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009455001\\dd3afc8fea.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\701ff1219c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009456001\\701ff1219c.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x000c000000023cde-1467.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
Processes:
1t88s7.exeskotes.exe2k5210.exe3a36L.exe4J089A.exe5dcbb72d2b.exedd3afc8fea.exe79d2c60732.exeeb3ffc280d.exeskotes.exeskotes.exepid Process 2016 1t88s7.exe 3652 skotes.exe 4424 2k5210.exe 5100 3a36L.exe 3716 4J089A.exe 5184 5dcbb72d2b.exe 5276 dd3afc8fea.exe 6776 79d2c60732.exe 1144 eb3ffc280d.exe 5776 skotes.exe 6388 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid Process procid_target PID 4752 set thread context of 5148 4752 powershell.exe 120 -
Drops file in Windows directory 1 IoCs
Processes:
1t88s7.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 1t88s7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 1768 4424 WerFault.exe 87 628 5184 WerFault.exe 118 5872 5184 WerFault.exe 118 5776 5184 WerFault.exe 118 6844 1144 WerFault.exe 174 -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
T5h09.exepowershell.exeRegAsm.exedd3afc8fea.exe701ff1219c.exeeb3ffc280d.exeB0s53.exe3a36L.exe4J089A.exeVBVEd6f.execmd.exeschtasks.exed71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf.exetaskkill.exetaskkill.exetaskkill.exe79d2c60732.exetimeout.exeskotes.exe2k5210.exe5dcbb72d2b.exetaskkill.exetaskkill.exeservice123.exe1t88s7.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language T5h09.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd3afc8fea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 701ff1219c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb3ffc280d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B0s53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a36L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4J089A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VBVEd6f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79d2c60732.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2k5210.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dcbb72d2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1t88s7.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
msedge.exefirefox.exefirefox.exeeb3ffc280d.exeVBVEd6f.exedescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 eb3ffc280d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VBVEd6f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString eb3ffc280d.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VBVEd6f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 6588 timeout.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
Processes:
chrome.exemsedge.exemsedge.exechrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 1272 taskkill.exe 2576 taskkill.exe 5140 taskkill.exe 3976 taskkill.exe 5708 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133771407918470798" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1t88s7.exeskotes.exe2k5210.exe3a36L.exe4J089A.exeVBVEd6f.exepowershell.exechrome.exe5dcbb72d2b.exedd3afc8fea.exeRegAsm.exemsedge.exemsedge.exemsedge.exe701ff1219c.exe79d2c60732.exeeb3ffc280d.exeskotes.exechrome.exeskotes.exepid Process 2016 1t88s7.exe 2016 1t88s7.exe 3652 skotes.exe 3652 skotes.exe 4424 2k5210.exe 4424 2k5210.exe 5100 3a36L.exe 5100 3a36L.exe 3716 4J089A.exe 3716 4J089A.exe 3716 4J089A.exe 3716 4J089A.exe 2312 VBVEd6f.exe 2312 VBVEd6f.exe 2312 VBVEd6f.exe 2312 VBVEd6f.exe 4752 powershell.exe 4752 powershell.exe 4752 powershell.exe 2388 chrome.exe 2388 chrome.exe 5184 5dcbb72d2b.exe 5184 5dcbb72d2b.exe 2312 VBVEd6f.exe 2312 VBVEd6f.exe 5276 dd3afc8fea.exe 5276 dd3afc8fea.exe 5148 RegAsm.exe 2312 VBVEd6f.exe 2312 VBVEd6f.exe 4496 msedge.exe 4496 msedge.exe 3500 msedge.exe 3500 msedge.exe 5768 msedge.exe 5768 msedge.exe 5768 msedge.exe 5768 msedge.exe 2000 701ff1219c.exe 2000 701ff1219c.exe 6776 79d2c60732.exe 6776 79d2c60732.exe 2000 701ff1219c.exe 2000 701ff1219c.exe 6776 79d2c60732.exe 6776 79d2c60732.exe 6776 79d2c60732.exe 1144 eb3ffc280d.exe 1144 eb3ffc280d.exe 1144 eb3ffc280d.exe 1144 eb3ffc280d.exe 1144 eb3ffc280d.exe 1144 eb3ffc280d.exe 1144 eb3ffc280d.exe 1144 eb3ffc280d.exe 1144 eb3ffc280d.exe 1144 eb3ffc280d.exe 2312 VBVEd6f.exe 2312 VBVEd6f.exe 5776 skotes.exe 5776 skotes.exe 3216 chrome.exe 3216 chrome.exe 6388 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
chrome.exemsedge.exechrome.exepid Process 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 3500 msedge.exe 3500 msedge.exe 3216 chrome.exe 3216 chrome.exe 3216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
Processes:
4J089A.exepowershell.exechrome.exetaskkill.exeRegAsm.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe79d2c60732.exechrome.exedescription pid Process Token: SeDebugPrivilege 3716 4J089A.exe Token: SeDebugPrivilege 4752 powershell.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeDebugPrivilege 3976 taskkill.exe Token: SeDebugPrivilege 5148 RegAsm.exe Token: SeDebugPrivilege 5708 taskkill.exe Token: SeDebugPrivilege 1272 taskkill.exe Token: SeDebugPrivilege 2576 taskkill.exe Token: SeDebugPrivilege 5140 taskkill.exe Token: SeDebugPrivilege 3488 firefox.exe Token: SeDebugPrivilege 3488 firefox.exe Token: SeDebugPrivilege 6776 79d2c60732.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeShutdownPrivilege 3216 chrome.exe Token: SeCreatePagefilePrivilege 3216 chrome.exe Token: SeDebugPrivilege 3488 firefox.exe Token: SeDebugPrivilege 3488 firefox.exe Token: SeDebugPrivilege 3488 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
1t88s7.exechrome.exe701ff1219c.exemsedge.exefirefox.exepid Process 2016 1t88s7.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2000 701ff1219c.exe 2000 701ff1219c.exe 2000 701ff1219c.exe 2000 701ff1219c.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 3500 msedge.exe 2000 701ff1219c.exe 2000 701ff1219c.exe 2000 701ff1219c.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
701ff1219c.exefirefox.exepid Process 2000 701ff1219c.exe 2000 701ff1219c.exe 2000 701ff1219c.exe 2000 701ff1219c.exe 2000 701ff1219c.exe 2000 701ff1219c.exe 2000 701ff1219c.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 3488 firefox.exe 2000 701ff1219c.exe 2000 701ff1219c.exe 2000 701ff1219c.exe 2000 701ff1219c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
RegAsm.exefirefox.exepid Process 5148 RegAsm.exe 3488 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf.exeB0s53.exeT5h09.exe1t88s7.exeskotes.exeVBVEd6f.exechrome.exedescription pid Process procid_target PID 4016 wrote to memory of 864 4016 d71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf.exe 83 PID 4016 wrote to memory of 864 4016 d71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf.exe 83 PID 4016 wrote to memory of 864 4016 d71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf.exe 83 PID 864 wrote to memory of 4344 864 B0s53.exe 84 PID 864 wrote to memory of 4344 864 B0s53.exe 84 PID 864 wrote to memory of 4344 864 B0s53.exe 84 PID 4344 wrote to memory of 2016 4344 T5h09.exe 85 PID 4344 wrote to memory of 2016 4344 T5h09.exe 85 PID 4344 wrote to memory of 2016 4344 T5h09.exe 85 PID 2016 wrote to memory of 3652 2016 1t88s7.exe 86 PID 2016 wrote to memory of 3652 2016 1t88s7.exe 86 PID 2016 wrote to memory of 3652 2016 1t88s7.exe 86 PID 4344 wrote to memory of 4424 4344 T5h09.exe 87 PID 4344 wrote to memory of 4424 4344 T5h09.exe 87 PID 4344 wrote to memory of 4424 4344 T5h09.exe 87 PID 864 wrote to memory of 5100 864 B0s53.exe 97 PID 864 wrote to memory of 5100 864 B0s53.exe 97 PID 864 wrote to memory of 5100 864 B0s53.exe 97 PID 4016 wrote to memory of 3716 4016 d71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf.exe 98 PID 4016 wrote to memory of 3716 4016 d71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf.exe 98 PID 4016 wrote to memory of 3716 4016 d71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf.exe 98 PID 3652 wrote to memory of 2312 3652 skotes.exe 99 PID 3652 wrote to memory of 2312 3652 skotes.exe 99 PID 3652 wrote to memory of 2312 3652 skotes.exe 99 PID 2312 wrote to memory of 2388 2312 VBVEd6f.exe 106 PID 2312 wrote to memory of 2388 2312 VBVEd6f.exe 106 PID 3652 wrote to memory of 4752 3652 skotes.exe 107 PID 3652 wrote to memory of 4752 3652 skotes.exe 107 PID 3652 wrote to memory of 4752 3652 skotes.exe 107 PID 2388 wrote to memory of 4380 2388 chrome.exe 109 PID 2388 wrote to memory of 4380 2388 chrome.exe 109 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 3364 2388 chrome.exe 110 PID 2388 wrote to memory of 408 2388 chrome.exe 111 PID 2388 wrote to memory of 408 2388 chrome.exe 111 PID 2388 wrote to memory of 2596 2388 chrome.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf.exe"C:\Users\Admin\AppData\Local\Temp\d71340b536d7c3c08adf557a7aa62c73ce4d28c4d45919a1c443e267dfa7edbf.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B0s53.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\B0s53.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\T5h09.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\T5h09.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1t88s7.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1t88s7.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe"C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffff438cc40,0x7ffff438cc4c,0x7ffff438cc588⤵PID:4380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2028,i,7156650104962309732,4481369165523341079,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2020 /prefetch:28⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1884,i,7156650104962309732,4481369165523341079,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2132 /prefetch:38⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2288,i,7156650104962309732,4481369165523341079,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2304 /prefetch:88⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,7156650104962309732,4481369165523341079,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:18⤵
- Uses browser remote debugging
PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3232,i,7156650104962309732,4481369165523341079,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:18⤵
- Uses browser remote debugging
PID:3268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4468,i,7156650104962309732,4481369165523341079,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4376 /prefetch:18⤵
- Uses browser remote debugging
PID:1884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4760,i,7156650104962309732,4481369165523341079,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4208 /prefetch:88⤵PID:5668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4920,i,7156650104962309732,4481369165523341079,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4928 /prefetch:88⤵PID:5692
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ff8081746f8,0x7ff808174708,0x7ff8081747188⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,3853672106441393654,10007458845584302458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:28⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,3853672106441393654,10007458845584302458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:38⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,3853672106441393654,10007458845584302458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2504 /prefetch:28⤵PID:5828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,3853672106441393654,10007458845584302458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2676 /prefetch:28⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,3853672106441393654,10007458845584302458,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2424 /prefetch:88⤵PID:5396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,3853672106441393654,10007458845584302458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2420 /prefetch:28⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,3853672106441393654,10007458845584302458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3344 /prefetch:28⤵PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2032,3853672106441393654,10007458845584302458,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:18⤵
- Uses browser remote debugging
PID:1704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2032,3853672106441393654,10007458845584302458,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:18⤵
- Uses browser remote debugging
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,3853672106441393654,10007458845584302458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3340 /prefetch:28⤵PID:2080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,3853672106441393654,10007458845584302458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3248 /prefetch:28⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,3853672106441393654,10007458845584302458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3844 /prefetch:28⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,3853672106441393654,10007458845584302458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3848 /prefetch:28⤵PID:5948
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1009342001\VBVEd6f.exe" & rd /s /q "C:\ProgramData\CBAFIDAECBGC" & exit7⤵
- System Location Discovery: System Language Discovery
PID:6692 -
C:\Windows\SysWOW64\timeout.exetimeout /t 108⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:6588
-
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1009351041\PeRVAzl.ps1"6⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"7⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5148
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009454001\5dcbb72d2b.exe"C:\Users\Admin\AppData\Local\Temp\1009454001\5dcbb72d2b.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5184 -s 16567⤵
- Program crash
PID:5872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5184 -s 14167⤵
- Program crash
PID:628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5184 -s 16927⤵
- Program crash
PID:5776
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009455001\dd3afc8fea.exe"C:\Users\Admin\AppData\Local\Temp\1009455001\dd3afc8fea.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5276
-
-
C:\Users\Admin\AppData\Local\Temp\1009456001\701ff1219c.exe"C:\Users\Admin\AppData\Local\Temp\1009456001\701ff1219c.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2000 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5708
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵PID:5156
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3488 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2040 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {af97a9b6-9a95-4628-9d39-501add57319a} 3488 "\\.\pipe\gecko-crash-server-pipe.3488" gpu9⤵PID:612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2476 -parentBuildID 20240401114208 -prefsHandle 2468 -prefMapHandle 2460 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {45de941b-e8d1-4ee7-ba90-b1af468ec5da} 3488 "\\.\pipe\gecko-crash-server-pipe.3488" socket9⤵PID:228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2964 -childID 1 -isForBrowser -prefsHandle 2832 -prefMapHandle 1684 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07aae296-322c-4daf-946d-e25c84aef1ca} 3488 "\\.\pipe\gecko-crash-server-pipe.3488" tab9⤵PID:4872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4000 -childID 2 -isForBrowser -prefsHandle 3996 -prefMapHandle 3992 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e502dd44-2050-4fa4-8435-9e72ad40202f} 3488 "\\.\pipe\gecko-crash-server-pipe.3488" tab9⤵PID:5208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3672 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4656 -prefMapHandle 4652 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {58d52ce2-e791-405c-aa8d-857a3ce9e307} 3488 "\\.\pipe\gecko-crash-server-pipe.3488" utility9⤵
- Checks processor information in registry
PID:6168
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5220 -childID 3 -isForBrowser -prefsHandle 5264 -prefMapHandle 5260 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {94b989c3-75ab-412e-bc97-1abd11c75265} 3488 "\\.\pipe\gecko-crash-server-pipe.3488" tab9⤵PID:2256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5420 -childID 4 -isForBrowser -prefsHandle 5340 -prefMapHandle 5348 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cdb6acf5-13b5-40a6-96d1-8104a93a440d} 3488 "\\.\pipe\gecko-crash-server-pipe.3488" tab9⤵PID:5368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5572 -childID 5 -isForBrowser -prefsHandle 5312 -prefMapHandle 5320 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1280 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec34deb0-f0b1-4f7d-9e13-6ee4be3139cb} 3488 "\\.\pipe\gecko-crash-server-pipe.3488" tab9⤵PID:5320
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009457001\79d2c60732.exe"C:\Users\Admin\AppData\Local\Temp\1009457001\79d2c60732.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6776
-
-
C:\Users\Admin\AppData\Local\Temp\1009458001\eb3ffc280d.exe"C:\Users\Admin\AppData\Local\Temp\1009458001\eb3ffc280d.exe"6⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1144 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
PID:3216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x174,0x178,0x17c,0x98,0x180,0x7ffff0d0cc40,0x7ffff0d0cc4c,0x7ffff0d0cc588⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2044,i,3899506130198543839,16587988252083602054,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2040 /prefetch:28⤵PID:4632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1956,i,3899506130198543839,16587988252083602054,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2080 /prefetch:38⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2308,i,3899506130198543839,16587988252083602054,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2436 /prefetch:88⤵PID:804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3236,i,3899506130198543839,16587988252083602054,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:18⤵
- Uses browser remote debugging
PID:5988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3280,i,3899506130198543839,16587988252083602054,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3304 /prefetch:18⤵
- Uses browser remote debugging
PID:5484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4608,i,3899506130198543839,16587988252083602054,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4332 /prefetch:18⤵
- Uses browser remote debugging
PID:6344
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4448
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 19007⤵
- Program crash
PID:6844
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2k5210.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2k5210.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 16485⤵
- Program crash
PID:1768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3a36L.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3a36L.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J089A.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4J089A.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4424 -ip 44241⤵PID:1308
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 5184 -ip 51841⤵PID:5380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5184 -ip 51841⤵PID:5628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5184 -ip 51841⤵PID:5816
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5776
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 1144 -ip 11441⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6388
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6424
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD50cbe49c501b96422e1f72227d7f5c947
SHA14b0be378d516669ef2b5028a0b867e23f5641808
SHA256750530732cba446649e872839c11e7b2a44e9fb5e053fc3b444678a5a8b262ac
SHA512984ea25c89baf0eb1d9f905841bda39813a94e2d1923dfb42d7165f15c589bd7ff864040ec8f3f682f3c57702498efff15a499f7dc077dd722d84b47cf895931
-
Filesize
44KB
MD5f57c45434583dfaae2a14b61d391ef6f
SHA19d3e148ee29d7d43a62febe2aeb05bea9b86c116
SHA256852cf2a83ff8c24a0bb9cd211fa0a64a1b60d9013265b1b5228be9f1cf17c2d0
SHA51299d06ef6fe42589cfe3260d021f3acbee80c74bb3f03692c6672adc6e87641d3e47bb71d52dda75df8195da1596406cc95c9b40d327c7d3f7295cf67c051a1e0
-
Filesize
264KB
MD5a76d0d70d3a95cb597bd3fd9fd9229e2
SHA1fd4a2697d630ee25c9ed6de53d382a6c07258350
SHA2565fcd4ced02adbb16697bcbab590ca377bfda099f4eb53364390aafb007966849
SHA512bd9050fc1702cf28cbda830db9b5d5bd480f7cfdfbc01686854459fabbcfb8e82b07527df80052f3ae1da8db0367b5df58b7a6c6af955e910403baf9d5224b30
-
Filesize
4.0MB
MD5a05b4ac40eddfd56379a44ea471a3ce0
SHA1dc98723a0f6ab1e80d5c6956477f6aee8a1ca115
SHA25614561c4505063280026735725b6cddd1479a56683af8efe5da8b19df4ce35cf4
SHA512a7380ffdfb2b86a3c4b3f1ecddbc0e92fd0cc244216cc1105ebc739d3f1892b36305603e7089de33943885595fe93e8c913bffc6b95e5d21b875c77107e58e46
-
Filesize
44KB
MD57426c8b37f7924b346625f2c8804f2ac
SHA111a9edcf467e4ae4497af055b79d4d0b19332863
SHA25679a29f063f5a65a2e943c3f460a86dcc70e37d4ff612301620df71e827e737ab
SHA5125e9beb6e7492a19d117f59d522107645958f78fe804bbdc59ca273af2058a46f05dfd30fe7a929f8ae970db6d932c98c963ed7e3244bf94132755458fdf86af2
-
Filesize
264KB
MD5a1ab7710b594e9fb75dc83ff1e2abb09
SHA1308b411643856dd84dec10c123ee72fcac7b002b
SHA2562452b61306e90bff6d03f37401681e9ea8875038be5406da489107d37eaaf3a9
SHA5122fee7c7014dffdde484703667ab9c1072f4a8d4d395aacfa52f5b75734397554ac130b2485ec024883c0a2b6548aa0706bc9d34e2f23d4d31304eb4416652445
-
Filesize
1.0MB
MD54e2e997da0ae227057e074c67afdb7fa
SHA10a0b4db63b5a84f0bbbd8b0d472e665be69697cb
SHA256e8fca9c48d54e3405ad60c23ca5eaf2f15fb9a1d59b3936f178fcfac70a967e4
SHA512cb721fb2c0a687fdf89041d9baac042e45991bdd57b1093968e16ba5230741f027c358c8e9f45bab4bf16461fd9145dfacf596e418f4cfda60694af4237ced3f
-
Filesize
4.0MB
MD5c73ceb946a84dd65c7571e065361ff89
SHA10188249b60156917726cece1be3ed2c5157841c4
SHA2565ac5fb30df32a601b6b949cb1a86f869a07ee8b35df9d4cf2a2187681e699483
SHA512f67fc989f0af95783654b6258b8061ec4eb69abb9065db26731eb76e735e6914ffd25b6ebbf4e018fc6899dbaa711af689e62fae4cac97d75d913f2047c2ced4
-
Filesize
329B
MD50ef6bd433030319e07f31b41f3c5fcb0
SHA17e41c507f4eb27524e206d10a9512d8193b6c385
SHA256a46075d9512500f1690729a01e801a793e1bc44b9c9dc919ecbb7476a32c9753
SHA512cce748b2d72926fe4803c3ed603999a707f155ee5045caaf6c52f17a4233c4d8d0b9b1f37b2aaeff1930d6934dcd0d1d43f70a0793e6e2ffc042825463fe6e4e
-
Filesize
1KB
MD50d05da9a727cd0f72e93a84b6c065820
SHA10e509bf644e2627e52484a8981a161ef9cdb8da9
SHA2564404f59e3eab8206dc7309dc3a22e2bc23ecbba961c1a7cb4fa2718d7448a957
SHA512ff00e53356c3c72e36b3c8a8e2801dde97bbe1e395ad799c6baafbc95343ec24cceef40ffca2654e188b61f9ce6b9847634808ef9d416bd0ce27f39b8aa4f092
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5128683e864e54f836eb46157b7b74299
SHA154d727ec0fcc52f602d24bd71eef1f80114c2bfd
SHA256c6ba572c0b9a3210dbd51fbf7f8d88c76ddeb5c778c81e02e85bff8935c8482f
SHA512ab79fa293c1ec1e65d5fdd2be8d26126a6811cda3e4e1cb5d97dd4f2c1ef2096a33941374fff7cfafba3ccf3dbbdf1b76a77771827546a33cb5ecc0dbc781f76
-
Filesize
333B
MD54f79cf17c28188baf9a692e3e2e5db07
SHA1943f77e0dbd2cf2e30174d1481b1e94bd8a234c3
SHA256df0b5286cbf86a722c4624b796033ab5766d595735ea3bd6cb52ff28b2f66da6
SHA51234aa9528ad2fa0bed9a105bd1b6be68ec31ef9f6fa3ce90d5d58d7b8b55d5e50d8b168090544660e8023a0174ca66979c4c3bb8115f4a148dec7d8adfb223f0d
-
Filesize
345B
MD53b4d4ba250f149198b8e8f7e11153757
SHA180c15ddd3ffcba81db1b6166fdbfa3db985cb094
SHA256f6ba024296aa1c587b48d759543db36dfa67061b144b48f739b5e6746452f132
SHA512f099e91f289381afbccc99fe3a3c1a438f5d9bd2459ab651a7486c7d60652bca8e4934b0302a683e872cd9b3812cf4f7cc9f4defb0dd8a4831034469794ca84a
-
Filesize
321B
MD54e709e846ec40e0235689067b1b357fc
SHA19531f9d5154af44a73e9c128dadbb744f945f8a3
SHA2561c1055841990b8c9587580c3b7a9fa7c05a29610ed869e87f0db4de44c329085
SHA512b17fb59210a851efbc83be6b3a08226a5ede1dcd9bf440900f767f0d14edb256217fb5632b0faf77283eba3b0a35a73afdc8f1defd09398257d2973314e22377
-
Filesize
8KB
MD584c181e7b37552c9dd33d3222a84ef9b
SHA10830ae7b1d94a87ff465ebe9c2176a53c811ea77
SHA2560f66f4bb25aa81ac59eeae736ff19c246ba1b0ef0fe22b66a95c0490f4bb5a5a
SHA5128db0bf007f36e21fae21f2b00f5d33f951f5d6247219234be73cde926e254d34d7006e365b00ccc8040ead79d3d6259bd2ed0f1411749fbb4184f1fa0d368931
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\bbf486da-8296-432f-a3d6-5c54a931d52d.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
18KB
MD500f45aba8ba8c11b50a8a31af6df0dc5
SHA13c3530d51b30a0078f8a558d2aa8efc6b8e6f596
SHA256f075dfeb2ddd43334088931be26d096e1964d85abbd512c5cba7086a28a1bba6
SHA512d6c882cf4a2c1d466c3b740ca77bbb4655897ebb567d67e33beb47b5c8b60ebf898b21b4a59ff1996b5695d0f2620cb0aec44dd92423a92fa7a7e54a2fdbc4b8
-
Filesize
320B
MD51b3ecba88332d11eeeef25b76590e321
SHA15f15624434735b41feaa510d6d566b2beb08318d
SHA256fc5bd51c944b06ae3cff026ed45e3f52490feab51b79eade9eb46150e0acb3c5
SHA512238052f59c0c388213c6048d338aacc103922259408648a301e3743ad23ac5443acd2184e310b287bda12d7a3f65088eab56d6eeb8817a89901978c46d34f10e
-
Filesize
1KB
MD5a6c2c5cc285b5d72192ce84ae5e06bcf
SHA11efceb3580ea1ddca06d9249cf171b02ffd8d891
SHA256c6cd34b6557c0d95dcaea8c800dc54f2fddcd49c085e3fb2690ca6edb550838b
SHA512f5f571fa154e9e51f997c857609dbddbd00e94a999a37531a16bbcb3b5b57bb6ac732c0fa963b27b349c3a600da1435872ec7bf6172f909101555e7046bdc2e8
-
Filesize
338B
MD5b0aa9bec043ff9aff26af8f1dd71930f
SHA111383047095d6ab93af60e0a1920ecd5deb6acc2
SHA2568de9b9fa3349602d23c382723b0ff1facd50943cf248a91bdbf55a768cb7753b
SHA512284550d068774072929fd347b6f8bf3aabf40f9ce6da49dea01762b00a6e919f81b12b37ebb118f7332ea0355c8c9d18a586e42533b5c8d5dec936fd9733e6f7
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
86B
MD5f732dbed9289177d15e236d0f8f2ddd3
SHA153f822af51b014bc3d4b575865d9c3ef0e4debde
SHA2562741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93
SHA512b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
5KB
MD5dc178962f31d251dfc5af91a5231b78e
SHA1364f0d44eb695240221df3d992f0c5de362133b3
SHA256bb2206e132e6f2141e3e10343c585a03f76c534152981b407e566ec937013bb9
SHA512646d7144c036c951bce1c2823053a8ddd80604199ef44c10dc9d6d140177f44ac9fc751c6cc72974630b910fd1cb896a70a5d9b871a3ae34c20a3d921c9884c6
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json.tmp
Filesize28KB
MD5ab15622ae5775148d4fa5812b22d4dd0
SHA109ebabbff2a1b73693ed4a8d6334a6e6bf4f9fdc
SHA256892d092cfba194f4d311323ec01d908dfbef35cdabe951bc42c56b71975cd208
SHA5129c168c55918087c783e3d92b124f53e085253c481ee95fdc6c5fbf4c25d0cdb076b5d4a8b3efd1ff4ffcfbefc901d7ad21d40149aef63b7883104333288b9157
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD52ac456dc701e62edc96e7c78d7cb9908
SHA177961941f1194678e7bf8de65adf47ca91646790
SHA2562fd9710ab3b50a69d47db9714e9ff7c8bc62c3e27a41eb653956c306dfb290da
SHA5121dc1adecd1433ad41dc5c2e8842af71235a5e9e95788b0278194661bba2f91608c42199fbc5f2069b9063ea111bb68d9af1d65981c27a5a1dde5d79e9297656b
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD53e280f9bc237d3d8318c739e2b187fcc
SHA1a5b2a7f6eada117515022fb2bb51b3b3e036fd85
SHA256c295b96340477688ef02385ae629eb40439fff121f3d7e15133b63cb53b47e9f
SHA5123aac11c20ce684ddb12f67fe2dcaef099620473725c73e9d48cb3b99d39b2782b2a83844f640b30f0138b23fe8f398b2f5b64c4d85f37e5558de77ee8cd950ef
-
Filesize
409KB
MD54ea576c1e8f58201fd4219a86665eaa9
SHA1efaf3759b04ee0216254cf07095d52b110c7361f
SHA256d94206d9509cc47cae22c94d32658b31cf65c37b1b15ce035ffaa5ce5872ad2f
SHA5120c7462bc590d06f0ead37246f189d4d56e1d62ff73f67bf7e2ce9c653d8c56812a5f1306fb504168f7e33b87485c3465ea921a36f1ba5b458d7763e45c649494
-
Filesize
3.0MB
MD52b918bf4566595e88a664111ce48b161
SHA1e32fbdf64bb71dc870bfad9bbd571f11c6a723f4
SHA25648492827286d403668996ae3814b2216b3b616f2fb4af2022bf3d2fc3f979a26
SHA512e3d58adbe13befe91fb950cc52b16d6d2fcb8f6d65bab4020222713207b07ce78b76e2e2532cf3de23149e934ba1e1cb9046a95a18424a668bfa4a355af6f44a
-
Filesize
901KB
MD5cdc59bd1b27b4f3b7c58dced455c2616
SHA1c14d1868e95b63607d167aa7f37e0947ba1dd0ad
SHA256a09e80ad0b055a1a7222999a6ff6190785a9f2c707e785bc0696615dac85eb28
SHA5124c52a3470545701bc0b083c9abd847d74920b198d52c2ac225dc4448d0d8c7388ffd34f52cc43b225b64dfc52f19b79fba24af77c9a48d0b90550c259bec45a2
-
Filesize
4.2MB
MD58bbc0ba3f7e3de90ec5e840675fb4312
SHA1d55c0017d44c6f92dab0a4590239633ae0d39c6d
SHA25661b556e5d3b3f6005b4d8074e31cb3b3fd99a285b62e8f141c5ee52bdfeb9e44
SHA5126a6fe43be875d44235b09f4b64fe54a0e3a2c426b314f236291c46f614774ebd3151ece273601f626c684a89138e452b713250d118f954694fef866775f740f6
-
Filesize
2.6MB
MD50240b7c66d6cf79bfd7b95fff6fd9dc3
SHA15dcf8ea00a049abe9b866ee4e1f29d62ee656731
SHA256b963ad296429c0ae779b103479fa31a61de119987601b520aaf02f5e2e81390c
SHA5125766ddbba3e2ff1f2b2bbc691dca1ce2d5f3289efd55d1bd118f999c382f576c21d67d443e6996ed20dbeef0c3c602193efe0c5d096d98438d3c6887e84bce4f
-
Filesize
5.5MB
MD50a07b96b8ba7bd2ba52f9ec28e562f1e
SHA1792ec7b96f6ba05f9fa14adcf93b63f4dc40e168
SHA25648858c934f5040b3437f05a1ef97bb522af18bd457faa4f459abd27293b1807b
SHA512d024f4ce2f8922783e22404cf85738d299a5df537fb8fcb8cd3717acc10a307f2444825bbfe8b91bf30668e47cd4692c293cc049f673f1557aef5c4e8e6e1c2f
-
Filesize
1.7MB
MD5d93fd3795d6fa86e06402a2f11be46ba
SHA1e670eaaaf23433fa7a27125af0291fcf0df95885
SHA25635b12ada409eee049b0fca0d3869bada83cc98dc1cfacd23c74a43d56ccff59d
SHA512c25cb5bbdbb0621185c131781e2bafa75e0adbc53bd18ef8916eb469f037ab72341b5b93742074939364e23f297403beb513bbd8ae17d0baa82df01ec25acc1f
-
Filesize
3.7MB
MD593770d9fab88f8fae8c87c5679f13801
SHA1da5fa59271fb629eae41f26586d6f709c80180f6
SHA256cf9a93544fc5e3f46f271b6d0aa055c975101ee969c9009197fff6a847ced418
SHA5120203a4ebc699be3dbd6e0deed13f0ed0b3044bf30cc37629a186cbef8ad4282096990fa78a12ec3e43f025334fca93bdb4ab42f679189d18e74721e02103fcef
-
Filesize
1.8MB
MD57920daea894cc2ef008794411bb22462
SHA17ad8259a1e1945809db9306ab3aa6ebb3d569501
SHA25653e9caad40cf2402f81425dfa2e3c3be4a6f9d09b1c9621735bfc67674ad82a1
SHA512f3b9351e828bd24ffef316ed451525f8d491067ebe278db6857dc2587479b395f921ce1a2151359c74d5fe04a4ff7eecd0d59680e821fc96ce3894fa78734876
-
Filesize
1.8MB
MD5c1756ba8e668171e8a8222cb72b339cf
SHA108c69f22e986d3e2844a995b6081fb04dea78c9a
SHA256b2f68e815f18b56d167d9aa0b4e4752e62a3a355a84198fe64692245d653ebc5
SHA512a515bba1ab918aa7014ff1af0a77ea2b7b084305230f826326f1b2b7e686c30e0f4276818228bf7b4e361ddb60732a4a3f72a0485220157880db8b5dbc6583b3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize8KB
MD51564fb6fc9218f6d9daeec91e1dc4953
SHA15e7c29cad967072c2716aa226bb70648f8953da5
SHA256d9ee66accb1874d94f6b5dee721fbf5dbb94062976eaed134c38dc8ad4bc49eb
SHA5127e2abc7760015e28db52466ba0aa063d63f517ee1d07f6fe0cd880076d7dc63e5004ffe64c69ad525d55bd25d3abbd25ad312ffa6fd9d001be30924f390d2dad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize18KB
MD5d38d0a65487d9ccc8bf712b2606fa442
SHA13ac871f3922c5e35790d7b274f8e2e438b2bdb53
SHA25646b2499d9fa7f245c2b06d428debca81480f4f195e7912baec7f2b6b663ea1c9
SHA512ee9df624f9af1a3981ccf6765227070434a0e1a05a38e865dd1e4632582023d0da28c05ec42f6070fa25b4666d7325d7977accebdbd04dbc2fad23a2a0f265f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD57915a6d5762f0e1a2793b2c2b6f1ff10
SHA188aa432f99e7e86f92d4ac0e62f5bb1ece073e66
SHA2562d1b570d3ec7790cbc5d0aada0e8a986a5e9f5fd2ed5000cb28e744adfd60440
SHA512171b4d31d3b279c84aa37906033de69969484bc734bcc0448ec4bc46d0fdee7e50e0f568b3bf71fe202404453f650f3afef6632ccbbf30638fc371bdf3b51e3d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD53f0a06c02db872c4491d2c0e7dd47f35
SHA119a92c20a24aafeed6f18349a97cbb37f231ce43
SHA2561be2f137448eceaf8022da12d685c3b9eb6de29974bd39fba283aaf9e3b09100
SHA512c77ee4c43946ec6fdb1d06962212c7ac50616077886c1f7d72ae624275602ccc700e6e5f550a13f3c4eff155e55b2bbaa2eb3a01e5eb8bb4d50fcbe9b2ff415a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize25KB
MD55a3c53145cb499a1c4516cf6b97b826d
SHA1a14d54d105cfd338f62f48d873a90ec4584af55d
SHA256c4adb5b863a2889d44da4c4a61848bfce702ffa8bac605d646da659df6e458a6
SHA5121991683a1cce66614660574ad8810199d10e1465d6336bcfc8e9e2f2e7faa1f3fb36a1074a77840ddc6fd4a80a6f6109fc1137ab2ea4fed03db1a685fef7bbab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD552167396b4a899c0b1769f79741f3b91
SHA1eb24b7b8d79f2385567e956f0b694a855af7a900
SHA256a77225628b1b8dd8a8f3e5d2c10217f4adc501c364a7fd7a6c663016d8feea1b
SHA5127bc9dde8279de928eeed2af93d23f4a61b626f9d496fe294353a79a68993a01f3af35d20f085f9d2116509dc76fb4b05dcf715cdd880b2732f348f3d4b4e592a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD50d4ba1ef87b4d19fbfab53c7f9eea2c5
SHA175423015aafd1ace744fe4a17b8553bfc76341b4
SHA256fd6b0f89750cd3d3166c48dc1dd37a42debaddcc0c29a7ad3765171da106c8b5
SHA512e1bde4df00eeab52e8ae7d070902f601cd93f7625354cd7bd9859ebe939cf5ce735021b5ac0cc2d93c710527c8d85890534f1a73b1db22b75bc6bdeaaf465954
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD56579ba849a54c6b95239c0f822a53b31
SHA17f32cd28a4eb21ba23845f57985c1272835e7552
SHA2564e961cf270d78bc83f98e2559613a3d52495ee259bbb5d1b61eb83ffdccbe1a1
SHA512603c097342b2ef227f8c3b6c0cd406a1e673e52a583814f525bc9d9cdb2fd5f2405ae6cdbedd9a9fb9617f558caa2f9f856463435ea069fe2e57b4f7a52999ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5f67f9625d77c956fe7c24d6305ef46ed
SHA133b495660dfd5d655e2928f8d0742006d80101d0
SHA256297bbe7b4bca731314e79f09c8af4d78482fd5a76449e6e806a3888ea9c2c136
SHA5121d682b8570f5b53067b516d8490c9ebd16b9490f35dfe2ae0d23bbfa43d603b87873b7865bd0893299515da93ffd7b98085e05973fe6602707032656d401846a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD507258c99bdf762a055e96b98bee868dd
SHA12f05d33eee7e66cdef25bf7cc9312536320c486f
SHA256612547a50b0e087650bfff27174eee23447bd28c1b3ab49fc88ef6c41e2e7b7a
SHA5120b8721a81807c0e5bc4b45ad83d0fb38aabae0705af784517224031642a6867c9991d91f54898f824f5959d19206cac0b2b6b9a45c6c3fec95b2b93e48862546
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\6fe9638a-9f56-4de1-9b2c-09e6f8c933c3
Filesize982B
MD57df3ace44e1ab39e1f373c8c0a1de91b
SHA10ccec92b475d2dddb60f059546de517a06eed2ba
SHA2562e52544278414b6ae61f775a3d7a6da5673be7a92dd498fbe63f30b44222f33d
SHA512c902108bbb2934c0bce12d656576df413f4840e79ff88e52dd8803a131f546dd8889d718105d7dd0289022123c1a825345325d5d35775987b18c51d2cf202b4d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\8695e0c0-c6a9-497e-8bc5-49b938ad3553
Filesize659B
MD5f7a15a16e8ee9132336d65fa6d934b15
SHA1fa6fb4e34768c0d048a7f475ea7fbcf3c02bd0b9
SHA256345fe0c2912c15b2cdad2219f68cf5afc29a1642739ebbadfb4657f1c6aa4196
SHA5124f5606bb9a48372b79a79afc8ac0f48ff73153ab458e5b1322d9453c86fecd42c481f750e02470e399e33bd52e5d3dc1442dcbf493b6ceacf2aee8845f766540
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD586310daec7b2d2a6278a33700fd14d40
SHA10c6bfa54e55e1179ef1da9cc24f57998282a6f5a
SHA256b6341a57ecb5da3b8e243a1b1dd748d000740f20a4586989f5864e9a41359822
SHA512e9290b23843a1725c08861e6343014b39342f1a04206d8f69516c0e3814545b2741a1d146aff9307e4f6491a32878e7b043db4a0b10c3012f890804a6f3d25bc
-
Filesize
15KB
MD5566148dbc5577e221132cb0a4f2cdd7d
SHA1779d9950c357837e8fd1d65fb09359ffcffa29ff
SHA256718e00488b54c4aa972db393a3a5242c3ee9a5fe12f9378281dab909f2aca451
SHA512b34519c69dc49deb57f09653debaef14b2b32d7fc2757dd72d810c1ff122b382bc60d5d95fc73b2661bbdabbf48765a45670844ed0c6a1eaa140b5e6aae1ec1a
-
Filesize
10KB
MD5d89f80c6cd7030b5202a2b8bb341bcb0
SHA1d6d89b620742d5c4d634fd1f71ac7d82163b6f27
SHA25674e7ac62ca8fd2e6235a8b5b3e1817dd3aa54a48525ecbdf274afbbeb46061d1
SHA51245599aaccb8a8236fb01e06deb5f9fc2f6eb428e4c582e5752a432fd22dde8c88abdef2e6efdf4b9ab0f32a3b09a1f738be0e887d373ed2047597c2b42c29004
-
Filesize
11KB
MD502f44ebc5aa07df435fbf6395f2295b3
SHA15a51f862898d0cca6d12e7cb697ec7e730739537
SHA256b51d3093a4510784b6f88c3129c24f66816f607d53565e34eb066b7e1df6a89c
SHA5128ffae3b3755faadde1067a5fa2bb24126968a802c6f49d1efbcf64b28f394550b71c5a76e26f4742f005972699047159414585b30512b4fca9a566a8ea8cb3fb
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e